• IBM

    Problem:

    Collection and analysis of logs. Prioritization of information security events. Investigation of incidents. User Behavioral Analysis.

    Decision:

    IBM Qradar, UBA, Watson.

    Results Achieved:

    Collection and analysis of 1.3 TB of logs per day. Prioritize all information security events. The threat response time has been reduced from 5 hours to 10 minutes. The time to investigate incidents decreased from 6 days to 4 hours. Behavioral analysis of all employees for risks to the company and infrastructure. All events from different sources of information are now in one interface.

    История

  • QUALYS

    Problem:

    Vulnerability Management. Inventory of IT assets. Investigation of incidents. Reporting to management and regulators.

    Decision:

    Visibility picture of the vulnerability of the entire network 24/7. Inventory of all IT assets, certificates and licenses. Automatic reporting of closed vulnerabilities and the state of infrastructure today. Monitoring and compliance with regulatory requirements. Equipment settings according to world standards GDPR, PCI DSS, ISO.

    Results Achieved:

    Vulnerability visibility on the network 24/7. Prioritize vulnerabilities from most critical to less important. Ways to solve and patch each of the vulnerabilities found, which allows to reduce the incident closure time to 2 hours. The time for preparing a report for the regulator and top management was reduced to 1 hour, which saves the resources of IS employees by 1 business day. An inventory of IT assets and licenses increased the productivity of procurement and IT staff by 4 times. Investigation of incidents was reduced to 2.5 hours.

    История

  • COBWEBS

    Problem:

    Publication of confidential company data on social networks; leakage of your corporate or personal data.

    Решение:

    через свои аккаунты и доступы производит сбор информации по указанным заказчиком критериям и выдает отчет.

    Results Achieved:

    unreliable employees found in companies.

    История

  • Thunder NSI

    Problem:

    Thunder NSI solution and implemented cases

    Decision:

    using a cloud platform, it takes care of all the DNS queries, analyzes them and sends only trusted queries to the client’s network.

    Results Achieved:

    300K + threats blocked, reduction in the number of calls to the support service, the database “Big Data” 2B + data points was created, the caching speed was increased to 90%.

    История

  • Splunk

    Problem:

    a wide variety of network devices.

    Decision:

    a wide variety of network devices.

    Results Achieved:

    • ;a single processing center
    • ;and monitoring data from network devices
    • ;reduced response time
    • ;up to 5 minutes per incident, which reduced costs
    • .1.8 times associated with downtime

    История

  • Wallix

    Problem:

    What do system administrators, database administrators, remote programmers do on your system? Who controls them? What actions led to data loss, inaccessibility of resources?

    Decision:

    monitors and monitors the actions of privileged users of your network.

    Results Achieved:

    differentiation of access by device groups, access and action control, working hours, prohibition of critical teams, all this allowed to increase the level of performing discipline among privileged users and reduce incidents with a negligent attitude to work.

    История

  • LANCOM

    Problem:

    variety of network equipment in the market.

    Decision:

    network equipment from one manufacturer.

    Results Achieved:

    reduction of equipment setup time.

    История

  • ENDPOINT PROTECTOR

    Problem:

    one of the leaders of DLP solutions (Data Loss Prevention).

    Decision:

    monitors and analyzes all passing user data and identifies leaks or possible risk data.

    Results Achieved:

    • ;loss prevention
    • ;confidential information
    • ;allowed to keep the news secret
    • .from competitors

    История

  • Verint

    Problem:

    to date, receiving a video image is not enough to quickly respond to threats.

    Decision:

    allows you to process large amounts of video data, which is to obtain a protected object by quickly responding to threats.

    Results Achieved:

    The speed of response to incidents has increased significantly, and most importantly, the quality of incident detection has increased. If earlier the percentage of identifying unreliable visitors was 34%, then after the introduction of the system it increased to 72%.

    • Defense costs decreased by almost 1.4 times in terms of 3 years, but the client received a single point of protection against attacks.
    • there is no need to train company specialists in different solutions, 24/7 support.

    История

  • Cynet

    Problem:

    almost 80% of resource-constrained (human and financial) enterprises can only afford to deploy antivirus and firewalls.

    Decision:

    allows you to protect yourself from the following threats using the cloud platform: Insider, cyber hygiene, mal-ware, fileless attack, APT, lateral movement, privileged user abuse, suspicious behavior, vulnerability management.

    Implementation:

    this solution was implemented at a major automobile concern in Poland.

    Results Achieved:

    protection costs decreased almost 1.4 times in terms of 3 years, but the client received a single point of protection from attacks, there is no need to train company specialists in different solutions, 24/7 support.

    История